• Title/Summary/Keyword: Contents security

Search Result 1,269, Processing Time 0.027 seconds

Modeling of Infectious Information Hiding System for Video Contents using the Biological Virus (생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.34-45
    • /
    • 2012
  • In this paper, we proposed and modeled a video contents protection system based on the infectious information hiding(IIH) technique as using characteristics of biological viruses. Our proposed IIH System considered the requisite important information for video contents protection as the infectious virus, and suggested a new paradigm about video contents protection that transmitted infectious information from contents(host) or video CODECs(viral vector). Also, we modeled the Pathogen, Mutant and Contagion virus as the infectious information and defined technical tools about verification of infectious information, kernel based IIH, contents based IIH and creation/regeneration of infectious information as main techniques for our IIH system. Finally, through simulations that carried the infectious information by using conventional information hiding algorithms as kernel based and contents based IIH techniques, we verified possibilities of our proposed IIH system.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Proposal and Analysis of Solution for Improving Problem of Our Country Logistics Security (우리나라 물류보안의 문제점 개선 방안 제안 및 분석)

  • Ahn, Jae-Deok;Lee, Ki-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.352-360
    • /
    • 2010
  • 9.11 This research since 2001, including shipping and port security and cargo flow international logistics the overall efficiency of the important issues of the international community that reflects the emerging research on the logistics to improve the security problems of I may occur in the logistics sector in the country, such as terrorism and to prevent security incidents from the security system of the logistics in order to operate in real time, and the introduction of advanced logistics and my analysis and logistics for the security system to collect data and develop lesson Logistics problems facing the security sector will want to analyze and improve the present. The analysis of the problems of logistics and security and find ways to improve research and literature selected by experts to improve, and to improve the first part of measures to improve the survey was analyzed through the AHP.

Economic Analysis of The Operational Policy for Data Backup with Information Security Threats (정보보호위협하에서 경제적인 데이터백업 운영 정책 분석)

  • Yang, Won Seok;Kim, Tae-Sung;Lee, Doo Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.270-278
    • /
    • 2014
  • The stability and security management of IT data becomes more important because information security threats increases rapidly in Big Data era. The operational policy of the data backup considering information security threats is required because the backup policy is the fundamental method that prevents the damage of security threats. We present an economic approach for a data backup system with information security threats which damage the system. The backup operation consists of the differential backup and the batch backup. We present a stochastic model considering the occurrence of information security threats and their damage. We analyze the stochastic model to derive the performance measures for the cost analysis. Finally we analyze the average cost of the system and give numerical examples.

Semantic Network Analysis of Research Trend Related to Private Security (언어 네트워크 분석(Semantic Network Analysis)을 활용한 민간경비 분야의 연구 경향)

  • Yang, Seung-Don
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.894-901
    • /
    • 2013
  • This study is aim to research trend of private security and to suggest direction of improvement to sector of private security. This study has been to analyzed to be useful social network analysis(particularly Degree Centrality and Clossness Centrality) for using typical research method about trend of academic subject. As a result of Degree Centrality and Clossness Centrality, Individual factors such as Job Stress and Job satisfaction of private security are more keyword than institutional factors and policy factors such as Security Services Industry Act and training for Private Security guards. It means that research trend of private security are to study Individual factors rather than institutional factors and policy factors. But, this study is a limit as follows; First, An object of study is only to searching article in National Assembly Liberary. A follow-up studies are need to expand the range of an object of study for private security.

Security and Trust of Mobile Payment Apps : Focus on Personal Predisposition and Security Signal (모바일 결제 앱에서의 보안과 신뢰 : 개인의 성향과 보안 신호를 중심으로)

  • Kim, Min-Gyung;Choi, Boreum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.194-204
    • /
    • 2019
  • The mobile payment app market has been expanding recently. However, the usage rate of mobile payment apps is not meeting service providers' expectations due to concerns about security and privacy. This study investigated how personal predisposition and how the security signals of the payment app affect users' perceived privacy and security risks, and how these factors ultimately affect the trust of mobile payment apps. The results showed that privacy concerns increase the risk of perceived personal information leaks and reduce perceived mobile system security, while familiarity, perceived reputation, and assurance seal reduce the risk of perceived personal information leaks and increase perceived mobile system security. Finally, it revealed that the reduced risk of perceived personal information leaks and the increased security of mobile systems had a positive impact on the reliability of mobile payment apps.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

Protection protocol for the contents rights intrusion (컨텐츠 유통 권리 침해 방지를 위한 프로토콜)

  • 김태우;이형우
    • Convergence Security Journal
    • /
    • v.3 no.1
    • /
    • pp.59-72
    • /
    • 2003
  • Recently, the studies of contents protection technique are getting popular in the field of internet DRM(Digital Right Management). But, authentication process of digital contents is different from each implementation. Also, protection technique for the contents rights intrusion adapts each other methodologies. We survey the modeling and system of DRM such as DOI, INDECS, MPEG-21, XrML, and OPIMA standard in this paper.

  • PDF

Pre-qualification based Application Contents Management Method for Smartphone (사전 검증 기법을 활용한 스마트폰용 애플리케이션 콘텐츠 관리 기법)

  • Park, Dae-Sik;Kwak, Jin
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1677-1686
    • /
    • 2010
  • Application contents verifications and operations are essential for using a secure smart phone environment. In the existing smartphone environment, application verification was performed only in the application company and users has direct management application. However these application verification and management practices have been caused by a variety of security vulnerabilities. Therefore, we will analyze the security vulnerabilities in the existing methods and then we propose an application contents management of smart phone using pre-qualification method.